咨询与建议

限定检索结果

文献类型

  • 73 篇 会议
  • 65 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 90 篇 工学
    • 66 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 21 篇 电气工程
    • 20 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 电子科学与技术(可...
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 交通运输工程
    • 3 篇 化学工程与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
  • 41 篇 理学
    • 25 篇 数学
    • 9 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 6 篇 生物学
    • 3 篇 化学
    • 3 篇 系统科学
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 3 篇 公共卫生与预防医...
  • 4 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 8 篇 feature extracti...
  • 8 篇 computer network...
  • 7 篇 computational mo...
  • 5 篇 computer archite...
  • 5 篇 wireless sensor ...
  • 5 篇 accuracy
  • 5 篇 ip networks
  • 4 篇 deep learning
  • 4 篇 application soft...
  • 4 篇 quality of servi...
  • 4 篇 servers
  • 4 篇 blockchain
  • 4 篇 cloud computing
  • 4 篇 privacy
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 data privacy
  • 3 篇 public key crypt...
  • 3 篇 ad hoc networks
  • 3 篇 grid computing

机构

  • 9 篇 key laboratory o...
  • 7 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 the department o...
  • 4 篇 shandong fundame...
  • 4 篇 shandong provinc...
  • 3 篇 network and data...
  • 3 篇 department of co...
  • 3 篇 shandong provinc...
  • 3 篇 the institute of...
  • 3 篇 institute for ne...
  • 3 篇 xi'an university...
  • 3 篇 school of comput...
  • 3 篇 engineering rese...
  • 3 篇 robotics and int...
  • 3 篇 shaanxi key labo...
  • 3 篇 the department o...
  • 3 篇 school of cyber ...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 7 篇 luo xiangyang
  • 6 篇 zhou jiantao
  • 6 篇 lu wei
  • 5 篇 song biao
  • 5 篇 mohammad mehedi ...
  • 4 篇 shi zhenghao
  • 4 篇 biao song
  • 4 篇 huh eui nam
  • 4 篇 jin haiyan
  • 4 篇 sheng ziqi
  • 3 篇 zhao minghua
  • 3 篇 eui nam huh
  • 3 篇 huh eui-nam
  • 3 篇 tang wei
  • 3 篇 yajun liu
  • 3 篇 li aimin
  • 3 篇 xinhong hei
  • 3 篇 fei rong
  • 3 篇 lin you

语言

  • 122 篇 英文
  • 16 篇 其他
  • 1 篇 中文
检索条件"机构=Internet Computing and Network Security Laboratory Department of Computer Engineering"
139 条 记 录,以下是71-80 订阅
排序:
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Yulian Ding Aimin Li Rong Fei Xie Guo Fangxiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial network
收藏 引用
computer Systems Science & engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论
YOLO-TP: A process detection model of tunnel real scene based on gradient information interaction
YOLO-TP: A process detection model of tunnel real scene base...
收藏 引用
computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: Jiaying Fan Shuping Pan Xinbo Jiang Shengtao Zhang Hongliang Liu Chuan Wang Jianghua Li Chenglin Ke Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China China Railway 14th Bureau Group First Engineering Development Co. Ltd RiZhao China
Target detection technology is an effective method to detect tunnel operation safety. Although the field has made some progress in detection models, the lack of datasets and detection models has hindered its developme... 详细信息
来源: 评论
Edge-cloud cooperation driven surface roughness classification method for selective laser melting
收藏 引用
Advanced engineering Informatics 2025年 66卷
作者: Ma, Shuaiyin Huang, Yuming Liu, Yang Yan, Zhiqiang Lv, Jingxiang Cai, Wei School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Xi'an710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an710121 China Shaanxi Union Research Centre of University and Enterprise for 5G+ Industrial Internet Communication Terminal Technology Xi'an University of Posts and Telecommunications Xi'an710121 China Department of Management and Engineering Linköping University LinköpingSE-581 83 Sweden Industrial Engineering and Management University of Oulu Oulu90570 Finland Key Laboratory of Road Construction Technology and Equipment of MOE Chang'an University Xi'an710064 China College of Engineering and Technology Southwest University Chongqing400715 China
Additive manufacturing (AM) technology is extensively utilized in aerospace and industrial manufacturing. However, parts built using AM are susceptible to spheroidization, porosity, cracks, and poor surface quality, m... 详细信息
来源: 评论
ResfEANet: ResNet-fused External Attention network for Tuberculosis Diagnosis using Chest X-ray Images
收藏 引用
computer Methods and Programs in Biomedicine Update 2024年 5卷
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Nnani, Ann O Deng, Fuhu Ejiyi, Thomas Ugochukwu Ejiyi, Makuachukwu Bennedith Agbesi, Victor Kwaku Bamisile, Olusola Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China College of Environmental Science and Engineering Hohai University Nanjing China Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu Nigeria Pharmacy Department University of Nigeria Nsukka Enugu Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Technology Research Centre Chengdu University of Technology Chengdu China
Pulmonary tuberculosis (TB), the most prevalent form of TB, remains a major global public health concern, contributing to more than a million deaths each year. The accurate and timely diagnosis of this disease is of p... 详细信息
来源: 评论
EC²Detect: Real-Time Online Video Object Detection in Edge-Cloud Collaborative IoT
收藏 引用
IEEE internet of Things Journal 2022年 第20期9卷 20382-20392页
作者: Siyan Guo Cong Zhao Guiqin Wang Jiaqing Yang Shusen Yang National Engineering Laboratory for Big Data Analytics and the School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China Department of Computing Imperial College London London U.K. National Engineering Laboratory for Big Data Analytics and the School of Computer Science and Technology Xi’an Jiaotong University Xi’an China School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China National Engineering Laboratory for Big Data Analytics and Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China Industrial Artificial Intelligence Center Pazhou Laboratory Guangzhou China
Video object detection is a fundamental technology of intelligent video analytics for internet of Things (IoT) applications. However, even with extraordinary detection accuracy, predominating solutions based on deep c... 详细信息
来源: 评论
Intelligent decoding method for Ground-penetrating radar based on improved YOLOv5
Intelligent decoding method for Ground-penetrating radar bas...
收藏 引用
computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: ZeYu Chen YongKang Wang HongLiang Liu Chuan Wang XinBo Jiang Ning Zhang Zhen Huang Lei Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) JiNan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China No.1 Engineering Development Co. Ltd. of China Railway 14Th Bureau Group RiZhao China
Ground-penetrating radar (GPR) is a non-invasive detection technique that effectively gathers information about subsurface materials. In tunneling projects, GPR can provide a fast and accurate forecast of the geologic... 详细信息
来源: 评论
The Initial Screening of Laryngeal Tumors via Voice Acoustic Analysis Based on Siamese network Under Small Samples
收藏 引用
Journal of Voice 2025年
作者: You, Zhenzhen Sun, Delong Shi, Zhenghao Du, Shuangli Hei, Xinhong Kong, Demin Du, Xiaoying Yan, Jing Ren, Xiaoyong Hou, Jin Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China Department of Otolaryngology Second Affiliated Hospital of Medical College Xi'an Jiaotong University Xi'an China
Objective: The initial screening of laryngeal tumors via voice acoustic analysis is based on the clinician's experience that is subjective. This article introduces a Siamese network with an auxiliary gender classi... 详细信息
来源: 评论
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
arXiv
收藏 引用
arXiv 2022年
作者: Ahmed, Fawad Rehman, Muneeb Ur Ahmad, Jawad Khan, Muhammad Shahbaz Boulila, Wadii Srivastava, Gautam Lin, Jerry Chun-Wei Buchanan, William J. Department of Cyber Security Pakistan Navy Engineering College NUST Karachi75350 Pakistan Department of Electrical Engineering HITEC University Taxila Pakistan School of Computing Edinburgh Napier University Edinburgh United Kingdom Department of Electrical Engineering HITEC University Taxila47080 Pakistan Robotics and Internet-of-Things Laboratory Prince Sultan University Riyadh Saudi Arabia RIADI Laboratory University of Manouba Manouba Tunisia Math and Computer Science Brandon University Brandon Canada Research Centre for Interneural Computing China Medical University Taichung Taiwan Dept of Computer Science and Math Lebanese American University Beirut Lebanon Western Norway University of Applied Sciences Bergen Norway
With the advancement in technology, digital images can easily be transmitted and stored over the internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in th... 详细信息
来源: 评论